General

  • Target

    035816b002dd003ea84a57213a592ac88f3ca0ae28152fb17ce0e7a41bbabb9f

  • Size

    261KB

  • Sample

    230607-pcb9zsaf51

  • MD5

    5cbcd15fd6bf7fdb975e4b0a2e5ec849

  • SHA1

    bab5ea8f5015e6e5aedc91b44316c7ff582b9fa5

  • SHA256

    035816b002dd003ea84a57213a592ac88f3ca0ae28152fb17ce0e7a41bbabb9f

  • SHA512

    034fff47c14995900ed4620a8a22abcafd490c7a4a1614b72c85d8df5a1c3be13637d3730d2404dc44096db05d38c5b7df38abe2eda8373fe507cb2fbcc813d7

  • SSDEEP

    3072:qhg7e10OdRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:Og61wFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      035816b002dd003ea84a57213a592ac88f3ca0ae28152fb17ce0e7a41bbabb9f

    • Size

      261KB

    • MD5

      5cbcd15fd6bf7fdb975e4b0a2e5ec849

    • SHA1

      bab5ea8f5015e6e5aedc91b44316c7ff582b9fa5

    • SHA256

      035816b002dd003ea84a57213a592ac88f3ca0ae28152fb17ce0e7a41bbabb9f

    • SHA512

      034fff47c14995900ed4620a8a22abcafd490c7a4a1614b72c85d8df5a1c3be13637d3730d2404dc44096db05d38c5b7df38abe2eda8373fe507cb2fbcc813d7

    • SSDEEP

      3072:qhg7e10OdRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:Og61wFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks